Preferred Language
Articles
/
joe-814
Two Stage Evaporative Cooling of Residential Building Using Geothermal Energy
...Show More Authors

The weather of Iraq has longer summer season compared with other countries. The ambient temperature during this season reaches over 50 OC which makes the evaporative cooling system suitable for this climate. In present work, the two-stage evaporative cooling system is studied. The first stage is indirect evaporative cooling (IEC) represented by two heat exchangers with the groundwater flow rate (5 L/min). The second stage is direct evaporative cooling (DEC) which represents three pads with groundwater flow rates of (4.5 L/min). The experimental work was conducted in July, August, September, and October in Baghdad. Results showed that overall evaporative efficiency of the system (two coils with three pads each pad of 3cm) reach to 167 % with the temperature difference between ambient and supply is 26.2oC. While it reached 122.7% (one coil with three pads ) with the temperature difference between ambient and supply is 16OC and reduced to 84.88% and 84.36% for IEC and DEC respectively.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
A Mathematical Model of a Thermally Activated Roof (TAR) Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature
...Show More Authors

This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Approximate Solution of Some Classes of Integral Equations Using Bernstein Polynomials of Two-Variables
...Show More Authors

The research aims to find approximate solutions for two dimensions Fredholm linear integral equation. Using the two-variables of the Bernstein polynomials we find a solution to the approximate linear integral equation of the type two dimensions. Two examples have been discussed in detail.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 10 2021
Journal Name
Engineering, Technology & Applied Science Research
Corruption Risk Analysis at the Project Planning Stage in the Iraqi Construction Sector using the Bowtie Methodology
...Show More Authors

In this paper, the bowtie method was utilized by a multidisciplinary team in the Federal Board of Supreme Audit (FBSA)for the purpose of managing corruption risks threatening the Iraqi construction sector. Corruption in Iraq is a widespread phenomenon that threatens to degrade society and halt the wheel of economic development, so it must be reduced through appropriate strategies. A total of eleven corruption risks have been identified by the involved parties in corruption and were analyzed by using probability and impact matrix and their priority has been ranked. Bowtie analysis was conducted on four factors with high score risk in causing corruption in the planning stage. The number and effectiveness of the existing proactive meas

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
A three-stage blumlein-circuit to generate transversely excited atmospheric nitrogen laser by using three spark gaps
...Show More Authors

In this research constructed N2 laser system by use developed method of electric discharge. In this method used four step of electric discharge by using four capacitors, three spark gaps, high tension power supply varying in range from 12kV to 24 kV and three resistors, this method called three stage blumlein circuit. The breakdown time delay of these parallel spark gaps cement strong ultraviolet preionization in the laser channel, thus the result of these amendments the laser output is many doubled and is more increasing than that obtained using the one and two stage blumlein circuits. This system has been designed and operated to give pulse laser with wavelength at 337.1 nm. This laser system can operate without mirrors and optical res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Factors Affecting Building Maintenance Practices: Review
...Show More Authors

Buildings begin to deteriorate gradually over time due to several factors, including environmental influences, improper use of the building, and neglected repairs for damages during the building's life span. Effective maintenance practices can minimize operational costs, extend the life of building systems and components, improve energy efficiency, and maintain property value. This paper aims to review articles related to building maintenance to identify factors affecting maintenance practices. After conducting the review, the result was that there were 33 factors affecting building maintenance categorized into six groups: management-related factors, manpower-related factors, technical-related factors, financial-

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Formal questioning and its representations in the design of contemporary residential rooms for children with autism
...Show More Authors

The formal investigation of the interior spaces of the residential bedrooms for children with autism is one of the basic tasks that should be known by the interior designer. Achieving an atmosphere compatible with his health condition, which contributes to generating a sense of spatial intimacy through the design dimension provided by the interior designer and his tireless endeavor to meet the needs of the child in an internal environment that achieves the functional dimension and spiritual approaches that enhance the child’s sense of spatial belonging and contribute to improving his mood and this positively reflects on his behavior and social integration. The current research has reached the most important design criteria that must be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Evaluation of routing protocol with multi-mobile sinks in WSNs using QoS and energy consumption parameters
...Show More Authors

An efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols i

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
(Energy alternatives and the possibility of substitution)
...Show More Authors

Many of the signs that the global energy system indicate the start of a period of transition from total dependence on fossil energy sources, especially oil, into a new era in which alternative energy sources play an important role in meeting the growing needs of energy demand, so sought many of the developed countries through research the studies carried out to try to bring renewable energy sources and non-renewable (shale oil, oil sands, solar energy, wind energy .... etc) replace traditional fossil energy sources (oil, gas, coal) and despite the recent availability dramatically and spread throughout the the world, but they are going to dry up in the foreseeable future. So many countries, especially the developed sought to find

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref